Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Guaranteed delivery of changes to security policies in a distributed system

Active Publication Date: 2009-01-13
INTELLECTUAL VENTURES I LLC
View PDF462 Cites 81 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0127]The advantages of the invention are numerous. Different embodiments or implementations may yield one or more of the following advantages. One advantage of the invention is that policy changes are distributed only to those user computers (clients) that are affected by the policy changes. Another advantage of the invention is that policy changes are implemented timely, transparently and without user interaction. Still another advantage of the invention is that informing user computers about policy changes can be deferred until associated users are on-line (i.e., logged into security system).

Problems solved by technology

However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information.
Without proper security means, an unauthorized person or machine may intercept any information traveling across the Internet and even get access to proprietary information stored in computers that interconnect to the Internet, but are otherwise generally inaccessible by the public.
However, it has been reported that many unauthorized accesses to proprietary information occur from the inside, as opposed to from the outside.
An example of someone gaining unauthorized access from the inside is when restricted or proprietary information is accessed by someone within an organization who is not supposed to do so.
Due to the open nature of the Internet, contractual information, customer data, executive communications, product specifications, and a host of other confidential and proprietary intellectual property remain available and vulnerable to improper access and usage by unauthorized users within or outside a supposedly protected perimeter.
Unfortunately, these various security means have been proven insufficient to reliably protect proprietary information residing on private networks.
For example, depending on passwords to access sensitive documents from within often causes security breaches when the password of a few characters long is leaked or detected.
These security systems, however, are not robust systems capable of efficiently and reliably permitting changes to security criteria, which is particularly challenging with security systems operating in networked environments.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Guaranteed delivery of changes to security policies in a distributed system
  • Guaranteed delivery of changes to security policies in a distributed system
  • Guaranteed delivery of changes to security policies in a distributed system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]The present invention relates to improved approaches for effectuating and communicating changes to security policies in a distributed security system. The changes to security policies are distributed to those users in the security system that are affected. As used herein, the user may mean a human user, a software agent, a group of users, a device and / or application(s). Besides a human user who needs to access a secured document, a software application or agent sometimes needs to access the secured document in order to proceed forward. Accordingly, unless specifically stated, the “user” as used herein does not necessarily pertain to a human being. The distribution of such changes to security policies can be deferred for those affected users that are not activated (e.g., logged-in or on-line) with the security system.

[0035]The present invention is related to processes, systems, architectures and software products for providing pervasive security to digital assets. The present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Improved approaches for communicating changes to security policies (or rules) in a distributed security system are disclosed. Depending on the status of an affected user in the system, the changes can be delivered to the user if the user is logged in the system or effectuated in a state message in a local server and the state message is delivered to the user next time the user is logged in the system. If a local server is not operative at the time that a change request is received for a user of the local server, the change request is redirected to another local server. The user is directed to the another local server to affect the change request. As a result, various changes are guaranteed to be delivered to the affected users without compromising the network efficiency.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation-in-part application of U.S. patent application Ser. No. 10 / 075,194, filed Feb. 12, 2002, and entitled “SYSTEM AND METHOD FOR PROVIDING MULTI-LOCATION ACCESS MANAGEMENT TO SECURED ITEMS,” which is hereby incorporated by reference for all purposes. This application also claims the benefits of U. S. Provisional Application No. 60 / 339,634, filed Dec. 12, 2001, and entitled “PERVASIVE SECURITY SYSTEMS,” which is hereby incorporated by reference for all purposes.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to security systems for data and, more particularly, to security systems that protect data in an inter / intra enterprise environment.[0004]2. Description of Related Art[0005]The Internet is the fastest growing telecommunications medium in history. This growth and the easy access it affords have significantly enhanced the opportunity to use advanced information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F15/16G06F9/445H04L29/06
CPCG06F21/6209G06F21/6218G06F21/6227H04L63/0428H04L63/08H04L63/102H04L63/105H04L63/12H04L63/20H04L67/42G06F2221/2107G06F2221/2111G06F2221/2113G06F2221/2137G06F2221/2141H04L63/101H04L67/01
Inventor SUPRAMANIAM, SENTHILVASANHUANG, WEIQINGVAINSTEIN, KLIMENTY
Owner INTELLECTUAL VENTURES I LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products